U.S. flag   An official website of the United States government
Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Https

Secure .gov websites use HTTPS
A lock (Dot gov) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.

CVE-2025-40126 Detail

Description

In the Linux kernel, the following vulnerability has been resolved: sparc: fix accurate exception reporting in copy_{from_to}_user for UltraSPARC The referenced commit introduced exception handlers on user-space memory references in copy_from_user and copy_to_user. These handlers return from the respective function and calculate the remaining bytes left to copy using the current register contents. This commit fixes a couple of bad calculations. This will fix the return value of copy_from_user and copy_to_user in the faulting case. The behaviour of memcpy stays unchanged.


Metrics

NVD enrichment efforts reference publicly available information to associate vector strings. CVSS information contributed by other sources is also displayed.
CVSS 4.0 Severity and Vector Strings:

NIST CVSS score
NIST: NVD
N/A
NVD assessment not yet provided.

References to Advisories, Solutions, and Tools

By selecting these links, you will be leaving NIST webspace. We have provided these links to other web sites because they may have information that would be of interest to you. No inferences should be drawn on account of other sites being referenced, or not, from this page. There may be other web sites that are more appropriate for your purpose. NIST does not necessarily endorse the views expressed, or concur with the facts presented on these sites. Further, NIST does not endorse any commercial products that may be mentioned on these sites. Please address comments about this page to [email protected].

URL Source(s) Tag(s)
https://git.kernel.org/stable/c/0bf3dc3a2156f1c5ddaba4b85d09767874634114 kernel.org
https://git.kernel.org/stable/c/41c18baee66134e6ef786eb075c1b6adb22432b0 kernel.org
https://git.kernel.org/stable/c/4fba1713001195e59cfc001ff1f2837dab877efb kernel.org
https://git.kernel.org/stable/c/57c278500fce3cd4e1c540700c0b05426a958393 kernel.org
https://git.kernel.org/stable/c/59424dc0d0e044b2eb007686a4724ddd91d57db5 kernel.org
https://git.kernel.org/stable/c/674ff598148a28bae0b5372339de56f2abf0b1d1 kernel.org
https://git.kernel.org/stable/c/7de3a75bbc8465d816336c74d50109e73501efab kernel.org
https://git.kernel.org/stable/c/9b137f277cc3297044aabd950f589e505d30104c kernel.org

Weakness Enumeration

CWE-ID CWE Name Source

Change History

1 change records found show changes

Quick Info

CVE Dictionary Entry:
CVE-2025-40126
NVD Published Date:
11/12/2025
NVD Last Modified:
11/12/2025
Source:
kernel.org